A penetration tester is tasked with evaluating the security of a mobile application. The tester wants to analyze the behavior of the application in a controlled environment to observe how it interacts with system resources and other applications. Which of the following is the BEST method to accomplish this goal?
Deploying the application on a segmented area of the production network
Leveraging a mobile security framework for static code analysis
Running the application on a jailbroken device with monitoring tools
Using a mobile device emulator